Rafayhackingarticles - rafayhackingarticles.net
General Information:
Latest News:
15k Twitter Account Hacked, A True Story? 22 Aug 2013 | 07:52 am
Few days back an article was published on techworm.in, where a hacker named "Mauritania Attacker" leaked claimed to leak thousands of twitter accounts, the data was made available for public to use an...
Why CPTE IS Better Than CEH? 6 Aug 2013 | 05:48 am
In today’s information age, the security of data and technical assets from “Hackers” has become the top priority for every organization. For this purpose organizations hunt for people who can actually...
Recon-ng Framework A Quick Intro 29 Jul 2013 | 09:53 am
Recon-ng is an open-source framework coded in python by Tim Tomes a.k.a LaNMaSteR53. Its interface is modeled after the look of the Metasploit Framework but it is not meant for exploitation or for spa...
Bypassing Cloudfare - Attack-Secure Challenge Writeup! 22 Jul 2013 | 02:17 pm
Few days back we setup a small and interesting challenge for RHA readers, the main goal of the challenge was to find the hosting provider and the real iP address of the attack-secure.com. Since attack...
Malware Not To Decrease Any Time Soon! 18 Jul 2013 | 04:54 am
There are now more than 1 billion smartphone users around the world, many of whom are connected to always-live cloud services. While e-mail and social media accounts are synced with their PC counterpa...
Win A Free Shot At "Samurai Skills" Penetration Testing Course 17 Jul 2013 | 03:19 am
Well, You might have already about "Attack-Secure Real World Penetration testing course", The course is based upon real world Penetration testing, The course covers almost every thing that you need to...
Launching Our Penetration Testing Services 3 Jul 2013 | 09:24 pm
For past couple of months there has been a significant increase in the freelance security testing projects we were doing here at RHA. However, we never officially documented our testing services and a...
How To Monitor A Remote Computer? 24 Jun 2013 | 02:58 pm
Are you looking for the a way to monitor a remote computer? Do you need to spy on your remote computer without the need for physical access? But wait! Before you go for any remote spy software you sho...
100 Ways To Become A Better Hacker 22 Jun 2013 | 05:23 am
Well, The title is self explanatory. This post would not rely upon my input but it would rely upon your input, We will be gathering here 100 ways to become a better hacker. In other words 100 ways to ...
Using Honeypots To Your Advantage - Attacking Kippo 20 Jun 2013 | 01:51 am
Rafay asked me to do a guest blog and I tried to guess what would be the most useful for this crowd? I think I got just the thing. Ever scanned a box, wondered if it was a honeypot or found it was a h...